security initiatives. Extensive knowledge of techniques, approaches and processes of digital threats; ability to detect, monitor, analyse and prevent digital threats. Proven knowledge of tools, techniques and processes of intrusiondetection and prevention; ability to detect, resolve and prevent intrusion behaviours to protect organisational networks. Desirable Working knowledge of concept, issues and techniques of cloud security; ability More ❯
key functions: Multi-Platform Threat Hunting at Scale - Run hunting queries and analytics across large datasets using a variety of cloud-based and hybrid security solutions. Custom Analytic and Detection Development - Writing and reviewing custom rules to deploy against national monitoring solutions to provide specialised monitoring to NHS bodies against common threat actor tactics and techniques. Specialist Incident Support … support to CSOU IM function and NHS organisations where appropriate during high complexity incidents. Main duties of the job Main duties of the role include: Threat Hunt in Extended Detection and Response (XDR) and SIEM tooling. Deputies for the Cyber Security Senior Analyst (Threat Hunting) in their absence. Develop capability in support of Threat Operations requirements, including coding and … technology development. Act as a technical support in advanced forensic investigations in support of Security Operations function. Simulate adversary tactics, techniques, and procedures in support of detection development. Perform dynamic & static analysis of malicious programs and tools where relevant in support of detection development. Development of automation workflows and playbooks to support threat hunting team workload. About us More ❯
of potential cyber threats. Contextualise and interpret threats via the use of intelligence models and frame works. Accurately identify indicators of compromise within intelligence items as well as potential detection opportunities. Carry out investigations into intelligence items of significance, identifying opportunities for further lead development. Provide specialist CTI support to protective monitoring teams during high complexity incidents. Create intelligence … of and ability to utilise a variety of specific tools for collecting, analysing, and presenting digital-related evidence. Skills & Experience Essential Proven knowledge of tools, techniques and processes of intrusiondetection and prevention; ability to detect, resolve and prevent intrusion behaviours to protect organisational networks. Desirable Demonstrable knowledge of the processes, tools and techniques of information security More ❯
Knowledge Essential Extensive knowledge of techniques, approaches and processes of digital threats; ability to detect, monitor, analyse and prevent digital threats. Demonstrable knowledge of tools, techniques and processes of intrusiondetection and prevention; ability to detect, resolve and prevent intrusion behaviours to protect organisational networks. Desirable Extensive knowledge of concept, procedures and processes of Security Information and More ❯